East China Normal University

Displaying 1-6 of 6 results

  • White Papers // Nov 2012

    Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness

    One of the main challenges in leakage-resilient cryptography is to obtain proofs of security against side-channel attacks, under realistic assumptions and for efficient constructions. In a recent paper proposed new designs of stream ciphers and pseudorandom functions for this purpose. Yet, a remaining limitation of these constructions is that they...

    Provided By East China Normal University

  • White Papers // Jul 2011

    Flooding Attacks Against Network Coding and Countermeasures

    Network coding has attracted the attention of many researchers in security and cryptography. While most of the works have been dedicated to the protection of messages carrying information, nothing has been done to protect the acknowledgment messages needed in network coding. These flooding attacks are critical in resource constraint networks...

    Provided By East China Normal University

  • White Papers // Feb 2011

    Spatial Analysis for Crime Pattern of Metropolis in Transition Using Police Records and GIS: A Case Study of Shanghai, China

    Crime is a long plagued issue of human society. Especially, with the expansion of cities and population aggregation in recent years, crime problems have become a great challenge in urbanization process. Both urban policy-makers and police departments have realized the importance of a better understanding of the dynamics of crime....

    Provided By East China Normal University

  • White Papers // Dec 2010

    Services in the Cloud Computing Era: A Survey

    Cloud Computing is becoming a well-known buzzword nowadays. As a brand new infrastructure to offer services, Cloud Computing systems have many superiorities in comparing to those existed traditional service provisions, such as reduced upfront investment, expected performance, high availability, infinite scalability, tremendous fault-tolerance capability and so on and consequently chased...

    Provided By East China Normal University

  • White Papers // Sep 2010

    Spatial Indexing of Global Geographical Data With HTM

    Spatial indexing is one of the most important techniques in the field of spatial data management. Many kinds of techniques of spatial indexing have been successfully developed, and each of them has advantages towards special applications. As a type of spatial data structure, Hierarchical Triangular Mesh (HTM) has excellent features...

    Provided By East China Normal University

  • White Papers // Aug 2008

    DDoS Attacks Detection Model and its Application

    With the proliferation of Internet applications and network-centric services, network and system security issues are more important than before. In the past few years, cyber attacks, including Distributed Denial-of-Service (DDoS) attacks, have a significant increase on the Internet, resulting in degraded confidence and trusts in the use of Internet. However,...

    Provided By East China Normal University

  • White Papers // Sep 2010

    Spatial Indexing of Global Geographical Data With HTM

    Spatial indexing is one of the most important techniques in the field of spatial data management. Many kinds of techniques of spatial indexing have been successfully developed, and each of them has advantages towards special applications. As a type of spatial data structure, Hierarchical Triangular Mesh (HTM) has excellent features...

    Provided By East China Normal University

  • White Papers // Feb 2011

    Spatial Analysis for Crime Pattern of Metropolis in Transition Using Police Records and GIS: A Case Study of Shanghai, China

    Crime is a long plagued issue of human society. Especially, with the expansion of cities and population aggregation in recent years, crime problems have become a great challenge in urbanization process. Both urban policy-makers and police departments have realized the importance of a better understanding of the dynamics of crime....

    Provided By East China Normal University

  • White Papers // Jul 2011

    Flooding Attacks Against Network Coding and Countermeasures

    Network coding has attracted the attention of many researchers in security and cryptography. While most of the works have been dedicated to the protection of messages carrying information, nothing has been done to protect the acknowledgment messages needed in network coding. These flooding attacks are critical in resource constraint networks...

    Provided By East China Normal University

  • White Papers // Nov 2012

    Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness

    One of the main challenges in leakage-resilient cryptography is to obtain proofs of security against side-channel attacks, under realistic assumptions and for efficient constructions. In a recent paper proposed new designs of stream ciphers and pseudorandom functions for this purpose. Yet, a remaining limitation of these constructions is that they...

    Provided By East China Normal University

  • White Papers // Aug 2008

    DDoS Attacks Detection Model and its Application

    With the proliferation of Internet applications and network-centric services, network and system security issues are more important than before. In the past few years, cyber attacks, including Distributed Denial-of-Service (DDoS) attacks, have a significant increase on the Internet, resulting in degraded confidence and trusts in the use of Internet. However,...

    Provided By East China Normal University

  • White Papers // Dec 2010

    Services in the Cloud Computing Era: A Survey

    Cloud Computing is becoming a well-known buzzword nowadays. As a brand new infrastructure to offer services, Cloud Computing systems have many superiorities in comparing to those existed traditional service provisions, such as reduced upfront investment, expected performance, high availability, infinite scalability, tremendous fault-tolerance capability and so on and consequently chased...

    Provided By East China Normal University